ABSTRACT: Cloud computing is a developing paradigm to give reliable and resilient infrastructure enabling the clients (data proprietors) to store their data and the data consumers (clients) can access the data from cloud servers. This paradigm reduces the storage and maintenance cost of the data proprietor. In the meantime, the data proprietor loses the physical […]
.NET PROJECTS
SC07-Achieving Fairness-aware Two-level Scheduling for Heterogeneous Distributed Systems
ABSTRACT: In a heterogeneous distributed system made out of different kinds of computing platforms, for example, supercomputers, gird, and clouds, a two-level scheduling methodology can be utilized to effectively distributed resources of the platforms to clients in the first level, and map tasks of the clients in nodes for every platform in the second-level for […]
SC04-Secure Data Group Sharing and Dissemination with Attribute and Time Conditions
ABSTRACT: Cloud computing has increasingly popular among clients and business around the world. Although cryptographic schemes can give data protection to clients in public cloud, a few issues likewise remain problematic, for example, secure data group information and fine-grained access control of time-sensitive data. In this project, we propose an identity-based data group sharing and […]
SC05-A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing
ABSTRACT: In Mobile cloud computing, offloading resource-demanded applications from cell phones to remote cloud servers can alleviate the resource scarcity of cell phones. Ongoing studies demonstrate that misusing the unused resources of the nearby cell phones for task execution can reduce the energy utilization and communication latency. All things considered, it is non-trivial to encourage […]
SC03-Blockchain For Large-Scale Internet of Things Data Storage and Protection-service
ABSTRACT: Internet-of-Things (IoT) devices are increasingly being found in civilization and military contexts, ranging from smart cities and the smart grid to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of-Battlefield-Things, and so forth. Mention the various number of observations, including the lack of publically accessible IoT datasets that can be utilized by the exploration and specialist networks. Given the […]
SC02-Semantic-based Compound Keyword Search over Encrypted Cloud Data
ABSTRACT: Keyword search over encrypted data is essential for getting to outsourced sensitive data in cloud computing. In some conditions, the keywords that the client searches on are only semantically identified with the data instead of by means of a correct or fuzzy match. Subsequently, semantic-based keyword search over scrambled cloud data becomes of paramount importance. […]
SC01-Scheduling Inter-Datacenter Video Flows for Cost Efficiency-service computing
ABSTRACT: As video streaming applications are deployed on the cloud, cloud providers are charged by ISPs for inter-data center transfers under the dominant percentile-based charging models. In order to minimize the payment costs, existing works expect to keep the traffic on each link under the charging volume. Be that as it may, these strategies can’t […]
IP05-Robust and Fast Decoding of High-Capacity Color QR Codes for Mobile Applications
ABSTRACT: Colour brings extra data capacity with regards to QR codes, however, it likewise conveys tremendous challenges to the decoding because of color interface and illumination variation, particularly for high-density QR codes. In this project, we put forth a system for high-capacity QR codes, HiQ, which optimizes the decoding algorithm for high-density QR codes to […]
IP03-Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling
ABSTRACT: Recovering the background and foreground area parts from video frames has important applications in video observation. Under the assumption that the background parts are stationary and the foreground is spare, the most part of existing techniques depend on the system of robust principal components analysis (RPCA), i.e., modeling the background and foreground parts as a […]
IP04-Robust Coverless Image Steganography based on DCT and LDA Topic Classification
ABSTRACT: So as to enhance the robustness and capability removing steganalysis, a novel coverless steganography algorithm based on Discrete Cosine Transform and Latent Dirichlet Allocation point classification is proposed. Firstly, the LDA point model is used for characterizing the image database. Also, the images have a place with one topic are chosen, and 8×8 block DCT […]